Yu Liu

ORCID: 0000-0002-5742-1266
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Wireless Networks and Protocols
  • Network Security and Intrusion Detection
  • 3D Surveying and Cultural Heritage
  • Software-Defined Networks and 5G
  • Outsourcing and Supply Chain Management
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Wireless Sensor Networks and IoT
  • Technology and Security Systems
  • Energy Harvesting in Wireless Networks
  • Digital Transformation in Industry
  • Simulation Techniques and Applications
  • Conservation Techniques and Studies
  • Cloud Computing and Resource Management
  • Remote Sensing and LiDAR Applications
  • Context-Aware Activity Recognition Systems
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • Peer-to-Peer Network Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Anomaly Detection Techniques and Applications
  • Security in Wireless Sensor Networks

Linköping University
2017-2024

Worcester Polytechnic Institute
2019-2023

Jiangxi University of Finance and Economics
2023

Central South University
2023

Guangdong Academy of Sciences
2023

Northeastern University
2023

Ericsson (Sweden)
2023

Beihang University
2023

ShanghaiTech University
2022

University of Manitoba
2022

The dramatic progresses of wireless technologies and wearable devices have significantly promoted the development popularity smart home, while digital twin (DT) emerges as a game changer benefiting from its enhanced capabilities visualization interaction. DT is able to build realtime continuous visual replica physical object or process, provide monitoring, anomaly prediction, interaction, lifecycle management. This paper presents model empower healthcare monitoring in home with goals...

10.1109/jsac.2023.3310097 article EN IEEE Journal on Selected Areas in Communications 2023-08-30

In wireless ad hoc networks, although defense strategies such as intrusion detection systems (IDSs) can be deployed at each mobile node, significant constraints are imposed in terms of the energy expenditure systems. this paper, we propose a game theoretic framework to analyze interactions between pairs attacking/defending nodes using Bayesian formulation. We study achievable Nash equilibrium for attacker/defender both static and dynamic scenarios. The is more realistic model, since it...

10.1145/1190195.1190198 article EN 2006-01-01

Indoor climate is closely related to human health, comfort and productivity. Vertical plant wall systems, embedded with sensors actuators, have become a promising application for indoor control. In this study, we explore the possibility of applying machine learning based anomaly detection methods vertical systems so as enhance automation improve intelligence realize predictive maintenance climate. Two categories anomalies, namely point anomalies contextual are researched. Prediction-based...

10.1016/j.buildenv.2020.107212 article EN cc-by Building and Environment 2020-08-24

Unmanned aerial vehicle (UAV) low-altitude remote sensing technology has recently been adopted in China. However, mapping accuracy and production processes of true digital orthophoto maps (TDOMs) generated by UAV images require further improvement. In this study, ground control points were distributed collected using a multi-rotor professional camera, at flight height 160 m above the designed sample distance (GSD) 0.016 m. A structure from motion (SfM), revised surface model (DSM) multi-view...

10.3390/ijgi7090333 article EN cc-by ISPRS International Journal of Geo-Information 2018-08-21

Despite the great success of two-stage detectors, single-stage detector is still a more elegant and efficient way, yet suffers from two well-known disharmonies during training, i.e. huge difference in quantity between positive negative examples as well easy hard examples. In this work, we first point out that essential effect can be summarized term gradient. Further, propose novel gradient harmonizing mechanism (GHM) to hedging for disharmonies. The philosophy behind GHM easily embedded into...

10.48550/arxiv.1811.05181 preprint EN other-oa arXiv (Cornell University) 2018-01-01

Historic buildings require good maintenance to sustain their function and preserve embodied heritage values. Previous studies have demonstrated the benefits of digitalization techniques in improving managing threats historic buildings. However, there still lacks a solution that can consistently organize data collected from reveal operating conditions real-time facilitate various analytics simulations. This study aims provide such help achieve preventive conservation. The proposed integrates...

10.1109/access.2022.3202181 article EN cc-by IEEE Access 2022-01-01

An indoor climate is closely related to human health, well-being, and comfort. Thus, monitoring management are prevalent in many places, from public offices residential houses. Our previous research has shown that an active plant wall system can effectively reduce the concentrations of particulate matter volatile organic compounds stabilize carbon dioxide concentration environment. However, regular care restricted by geography be costly terms time money, which poses a significant challenge...

10.1109/access.2018.2847440 article EN cc-by-nc-nd IEEE Access 2018-01-01

Internet of Things (IoT) has been found pervasive use cases and become a driving force to constitute digital society. The ultimate goal IoT is data the intelligence generated from data. With progress in public cloud computing technologies, more can be stored, processed analyzed release power IoT. However, due heterogeneity hardware communication protocols world, interoperability compatibility among different link layer protocols, sub-systems, back-end services have significant challenge...

10.1109/access.2019.2913224 article EN cc-by-nc-nd IEEE Access 2019-01-01

Today, the edge-cloud computing paradigm starts to gain increasing popularity, aiming enable short latency, fast decision-making and intelligence at network edge, especially for industrial applications. The container-based virtualization technology has been put on roadmap by industry implement infrastructures. Has performance of stacks reached requirement? In this paper, from client perspective, we provide a evaluation methodology apply it state-of-the-art containerization-based influences...

10.1109/ojies.2021.3055901 article EN cc-by IEEE Open Journal of the Industrial Electronics Society 2021-01-01

In wireless ad hoc networks, although defence strategies such as Intrusion Detection Systems (IDSs) can be deployed at individual nodes, significant constraints are imposed in terms of the energy expenditure systems. this paper, we use a game theoretic framework to analyse interactions between pairs attacking/defending both static and dynamic contexts, considering complete incomplete information regarding maliciousness neighbouring nodes. The case analysis provides defender with an overview...

10.1504/ijsn.2006.011784 article EN International Journal of Security and Networks 2006-01-01

This study proposes a digitalization framework for historic buildings. In this framework, advanced techniques, like Internet of Things (IoT), cloud computing, and artificial intelligence (AI), are utilized to create digital twins A twin is software representation physical object. uses protect, predict, optimize through analytics real-time historical data selected features. Heterogeneous buildings, such as indoor environment, energy consumption metering, outdoor climate, collected with proper...

10.1088/1755-1315/863/1/012041 article EN IOP Conference Series Earth and Environmental Science 2021-10-01

It is evident that traditional end-to-end intrusion detection mechanisms developed on wireless local area networks (WLANs) and wired are no longer sufficient for breach investigation in ad hoc networks. Most existing techniques proposed the network layer. In general, these have difficulty to localize attack source, can not respond attacks promptly. this paper, we investigate use of MAC layer traffic data characterize normal behaviors neighborhood a mobile node, detect misbehaving nodes...

10.1109/iaw.2005.1495980 article EN 2005-08-16

Proximity service (ProSe), using the geographic location and device information by considering proximity of mobile devices, enriches services we use to interact with people things around us. ProSe has been used in social networks also smart home building automation (Google Home). To enable home, reliable stable network protocols communication infrastructures are needed. Thread is a new wireless protocol aiming at (BA), which supports mesh native Internet connectivity. The latency should be...

10.1109/access.2018.2888939 article EN cc-by-nc-nd IEEE Access 2018-12-24

Building Information Modeling (BIM) has catalyzed transformative shifts across various industries, which sparked broader research interests in the BIM lifecycle. However, studies that specify stated requirements for different technologies and methodologies from perspective of lifecycle analyze hotspots future trends at each stage are scarce. Employing scientometric theories methods, this study conducts an in-depth comparative analysis stages. The encompasses several aspects like annual...

10.3390/buildings13112688 article EN cc-by Buildings 2023-10-25

Motivated by the proliferation of wireless building automation systems (BAS) and increasing security-awareness among BAS operators, in this paper, we propose a taxonomy for security assessment BASs. We apply proposed to Thread, an emerging native IP-based protocol BAS. Our analysis reveals number potential weaknesses design Thread. solutions mitigating several identified discuss their efficacy. also provide suggestions improvements future versions standard. Overall, our shows that Thread has...

10.1109/tii.2018.2844955 article EN IEEE Transactions on Industrial Informatics 2018-06-07

In this paper, we propose a node-based intrusion detection system (IDS) for wireless ad hoc networks. Specifically, define feature set that correlates information from MAC layer and network to profile normal behaviors of mobile nodes, also adapt rule-based data mining technique anomaly detection. The proposed IDS is able effectively detect an attack localize the source within one-hop perimeter. False positive rate reduced through decision module where intelligence gathered neighbor nodes...

10.1109/securecomm.2005.36 article EN 2006-03-22

Container orchestration platform is the foundation of modern cloud infrastructure. In recent years, container has been evolving to cross boundary device, edge, and cloud. More more IoT applications such as robotics XR have deployed across device-cloud continuum through platform, e.g., Kubernetes (K8s) framework. Meanwhile, rapid expansion advanced communication technologies like 5G endorsed revolution in network resource available for critical use cases. This paper aims integrate...

10.1109/cloudcom59040.2023.00023 preprint EN arXiv (Cornell University) 2024-03-08

10.1016/j.procs.2024.10.020 article EN Procedia Computer Science 2024-01-01

The need for energy efficiency in wireless communication is prevalent all areas, but to an even greater extent low-power and lossy networks that rely on resource-constrained devices. This paper seeks address the problem of modeling battery lifetime a duty-cycled node, participating sensor network typically used smart home building applications. Modeling MATLAB experimentation with prototype testing are employed predict validate lifetime. Various scenarios including sleepy end devices modeled...

10.1109/tii.2017.2773066 article EN IEEE Transactions on Industrial Informatics 2017-11-13

This paper studies the dilemma between fault tolerance and energy efficiency in frame-based real-time systems. Given a set of K tasks to be executed on system that supports L voltage levels, proposed heuristic-based scheduling technique minimizes consumption execution when faults are absent, preserves feasibility under worst case occurrences. The first finds out optimal solution comparable continuous scaling, then converts original system. runtime complexity is only (LK <sup...

10.1109/date.2010.5457039 article EN Design, Automation &amp; Test in Europe Conference &amp; Exhibition (DATE), 2015 2010-03-01
Coming Soon ...